General

  • Target

    964ca687aae19eb199c4da55fa0667ce.exe

  • Size

    951KB

  • Sample

    201109-8sf6kdqyc2

  • MD5

    964ca687aae19eb199c4da55fa0667ce

  • SHA1

    b13e4a835e608d2a3e9c3ff718078a1131092375

  • SHA256

    b30f264fda73db6970c313776095289e5fc0ee77f6be19010e2f9e125205e845

  • SHA512

    2d5f3b51a350850b0e70e7bc1659788a9b7f8505cc02ab7a9688aa0a86e8480da35e79f26443c78cdedbc6cc9cba4d54b211e11434f611cb8d7405ca7434c32b

Malware Config

Extracted

Family

raccoon

Botnet

4320d8bbff1d6d308fddc660016aa8623ee9fec1

Attributes
  • url4cnc

    https://telete.in/jrikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

corinthiano.ug

Targets

    • Target

      964ca687aae19eb199c4da55fa0667ce.exe

    • Size

      951KB

    • MD5

      964ca687aae19eb199c4da55fa0667ce

    • SHA1

      b13e4a835e608d2a3e9c3ff718078a1131092375

    • SHA256

      b30f264fda73db6970c313776095289e5fc0ee77f6be19010e2f9e125205e845

    • SHA512

      2d5f3b51a350850b0e70e7bc1659788a9b7f8505cc02ab7a9688aa0a86e8480da35e79f26443c78cdedbc6cc9cba4d54b211e11434f611cb8d7405ca7434c32b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks